> Hi I spotted this project: https://www.own-mailbox.com/#HowWork
Looking over their FAQ, I found this entry which makes me doubt them even further. It downright deserves a fisking, which I'll deliver inline. "Q: Why shouldn't I trust any cloud email service with JavaScript encryption on the client-side ? A: These services cannot be trusted, because they still give power to companies to spy on you. Why is it not secure? 1-Encryption is done in JavaScript, and therefore relies on your browser's JavaScript engines, which 80% of the time are proprietary software coming from Google, Microsoft, Apple, and most eminent NSA collaborators." Nice allegation there about Google, Microsoft, and Apple all being NSA collaborators. It's pretty strange, though, that *all of these* companies are currently pushing crypto in a big way, to the point that the USG is currently pushing for legislation requiring back-doors into crypto... why, it's almost as if they're not collaborating at all, and are responding to what they see as overreaching government practices by introducing technologies to make those overreaches more difficult. Second, these guys are flat factually wrong about JavaScript engines. Internet Explorer's Chakra engine is proprietary code. Apple Safari's Nitro engine, Mozilla Firefox's Spidermonkey engine, and Google Chrome's V8 engine (also used in Chromium) are all open-source. Let me repeat that: the *only* proprietary JavaScript engine in common use today is in Internet Explorer. "It leaves 4% chances that both you and your correspondent don't use any of them, (because even if you don't use them, your correspondent might, and he would compromise your security). Using these browsers for cryptography, even once, leaves these companies full power to forever break your cryptography." Cryptography is not like virginity, where once you lose it it's gone forever. I have a hard time believing that anyone could believe this crap -- I've had boxes compromised before, and guess what, I wasn't "forever" compromised. Talk about how "using these browsers for cryptography, even once, leaves these companies full power to forever break your cryptography" is scaremongering, plain and simple, full stop. Somebody really ought to write a FAQ entry about scaremongerers. https://www.gnupg.org/faq/gnupg-faq.html#fraudsters "By extension any cryptography done on a proprietary operating system like Mac or Windows can be considered as doomed, since Microsoft and Apple can then access your keys." "Doomed" is such a scaremongering word. It may be unwise, but it's certainly not *doomed*. Further, where is there any evidence that Microsoft or Apple has ever turned over a user's encryption keys? Has this ever happened? Do they even have that capability? Or is the author just trying to scare you? "2-The JavaScript code may be changed at any time by the email service provider. So except if you check the JavaScript code sent to you each time before entering your password (which is impracticable), you leave the email service provider open to breaking your cryptography at any time they want, without you even necessarily knowing it (since you don't check it)." Mostly true. "3-These services don't and cannot have a strong private key encryption. They rely on a much weaker private password that can be remembered by a human being. Therefore, they either use a much weaker algorithm than openPGP, or they use openPGP but store YOUR private key on THEIR servers, in clear form or encrypted with a simple password. In the movie citizenfour, Edward Snowden quoted saying "A 10 character password can be broken by the NSA in few days". So in practice, using a simple password for encryption make those services easily breakable. In comparison GPG was initially designed to work with 2048 or 4096 bits long private keys. GPG and SSL use this kind of strong private key encryption, as simple passwords are too weak and can be easily broken." This one makes my head hurt. Yes, a 10-character passphrase can be broken in a few days. It can probably be broken in a few *milliseconds*. Rainbow tables are awesome and there's not enough entropy in a 10-character passphrase to really do the trick. But that's why we recommend longer passphrases with higher entropy. My Google login, for instance, is literally 128 bits of random noise put into Base64. Second, they seem to be completely missing the distinction between the length of an asymmetric key and the entropy of that asymmetric key. My 128-bit Google passphrase, which I've committed to memory and have no trouble inputting by hand, is about as hard to break as a 3072-bit RSA key. Should you use short passphrases on sites that you care about? Absolutely not. But it's just *flat* *wrong* to say that web services don't and cannot use strong encryption. "4-If you want to access your emails on computers that are not yours (at the library, at work, at a printing store), you have to do cryptography on their computer, and therefore you're never really sure that you don't compromise your whole cryptographic system, you are effectively giving the power to the computer's owner to break it." And how is this cured, *in any way*, by using a stranger's computer to access your email over HTTPS? That stranger could store a local copy of your email, your keystrokes into the terminal for your passphrase, etc... "5- It is controversial whether JavaScript as a language, is actually able to perform good quality encryption at all." Dunno. I'm a pretty sharp guy but I'm not qualified to have an opinion on this one. This puts me slightly ahead of these guys, who appear just as unqualified but don't know it. I'm friends with Dr. Terri Oda, whose Ph.D. research was in JavaScript security. I'll ask her what she thinks. If she tells me that these guys are champs and I'm completely in the wrong, y'all have my word I'll come clean. "This is not only theoritical. The company hushmail, providing an email service with java/javascript client-side encryption, has allready spied on its users. [3]. If they could do it and did it, how do you know other companies won't?" Hushmail was ordered by a court to cooperate with an investigation. In order to make things easier for users, they allowed users to do crypto *server-side*. They advised users this was less secure. People still did it anyway, because convenience is more important to most people than security. Hushmail was ordered to compromise their *server-side* crypto for a small number of users in order to cooperate with a legitimate Canadian investigation. Remember what this FAQ question is about? "Why shouldn't I trust any cloud email service with JavaScript encryption on the client-side?" Why would someone present an instance of a company compromising *server-side* encryption as an argument against trusting *client-side* encryption? The only reason I can think of is to scare you. "To conclude, it should be said that a broken cryptography implies not only that your future emails can be watched, but also that all your past emails can also retroactively be read by spies." This is true for OpenPGP. This isn't true for any system that employs, e.g., perfect forward secrecy. Break a message in a system that employs PFS and you can neither read previous traffic nor future traffic. "Also you should not forget how aggressive the attempts are to break cryptography. There have been several attempts from the US government in the past to add flaws in the Linux kernel, in order to break cryptography [4]. So it is very dangerous to leave that many security holes opened, which are easy ways for NSA and other organizations to break in." All this obsession with the NSA. One wonders if they think the Chinese Ministry of State Security is any less aggressive, or any less of a threat. Obsessing on one three-letter agency to the omission of all others is a sign of someone who has not done a very good job of thinking through the problem. Sometime, ask the kernel.org guys who they think was responsible for the big intrusion back in 2012-2013, and what they think the goal was. I'm not at liberty to say, since it was told to me in a personal conversation, but I will say it wasn't American in origin... _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users